STIGQter STIGQter: STIG Summary: Oracle Database 11g Installation STIG Version: 8 Release: 20 Benchmark Date: 28 Jul 2017:

Database executable and configuration files should be monitored for unauthorized modifications.

DISA Rule

SV-24597r1_rule

Vulnerability Number

V-2420

Group Title

DBMS software monitoring

Rule Version

DG0010-ORACLE11

Severity

CAT III

CCI(s)

Weight

10

Fix Recommendation

Develop, document and implement procedures to monitor changes made to the DBMS software.

Identify all database files and directories to be included in the host system or database backups and provide these to the person responsible for backups.

For Windows systems, you can use the dir /s > filename.txt run weekly to store and compare file modification/creation dates and file sizes using the DOS fc command.

For UNIX systems, you can use the ls –as >filename.txt command to store and compare (diff command) file statistics for comparison.

These are not as comprehensive as some tools available, but may be enhanced by including checks for checksums or file hashes.

Check Contents

Ask the DBA to describe/demonstrate any software modification detection procedures in place and request documents of these procedures for review.

Verify by reviewing reports for inclusion of the DBMS executable and configuration files.

If documented procedures and proof of implementation does not exist that includes review of the database software directories and database application directories, this is a Finding.

Vulnerability Number

V-2420

Documentable

False

Rule Version

DG0010-ORACLE11

Severity Override Guidance

Ask the DBA to describe/demonstrate any software modification detection procedures in place and request documents of these procedures for review.

Verify by reviewing reports for inclusion of the DBMS executable and configuration files.

If documented procedures and proof of implementation does not exist that includes review of the database software directories and database application directories, this is a Finding.

Check Content Reference

I

Responsibility

Information Assurance Officer

Target Key

1368

Comments